Preferred Language
Articles
/
LRbJIosBVTCNdQwCWMgq
Identification of Pathogenic Fungi in Renal Transplant Patients by Conventional and Molecular Methods
...Show More Authors

Opportunistic fungal infections due to the immune- compromised status of renal transplant patients are related to high rates of morbidity and mortality regardless of their minor incidence. Delayed in identification of invasive fungal infections (IFIs), will lead to delayed treatment and results in high mortality in those populations. The study aimed to assess the frequency of invasive fungal infection in kidney transplant recipients by conventional and molecular methods. This study included 100 kidney transplant recipients (KTR) (75 males, and 25 females), collected from the Centre of Kidney Diseases and Transplantation in the Medical City of Baghdad. Blood samples were collected during the period from June 2018 to April 2019. Twenty one out of 100 renal-transplanted patients were infected with pathogenic fungi, four of the patients were females and 17 were males. There is an observation of a high incidence of fungemia in patients with the abnormal value of blood urea according to PCR and culture results. Referring to fungal isolates the most prevalent was Saccharomyces cerevisiae, which account for 19 isolates out of 21 the other two isolates were Zygosaccharomyces rouxii and Aspergillus flavus. The results of the current study show significant correlation between PCR and culture methods at (P<0.0009).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Mon Jan 04 2021
Journal Name
Iium Engineering Journal
RELIABLE ITERATIVE METHODS FOR SOLVING 1D, 2D AND 3D FISHER’S EQUATION
...Show More Authors

In the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Fri Feb 25 2022
Journal Name
Egyptian Journal Of Chemistry
Design, molecular docking, synthesis, and in vitro pharmacological evaluation of biomolecules-histone deacetylase inhibitors conjugates with carbohydrazide as a novel zinc-binding group
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Planning the Production of the Electrical Distribution Converter (400KV/11) Using Time Series Methods and Goal Programming in the Fuzzy Environment
...Show More Authors

This Paper aims to plan the production of the electrical distribution converter (400 KV/11) for one month at Diyala Public Company and with more than one goal for the decision-maker in a fuzzy environment. The fuzzy demand was forecasting using the fuzzy time series model. The fuzzy lead time for raw materials involved in the production of the electrical distribution converter (400 KV/11) was addressed using the fuzzy inference matrix through the application of the matrix in Matlab, and since the decision-maker has more than one goal, so a mathematical model of goal programming was create, which aims to achieve two goals, the first is to reduce the total production costs of the electrical distribution converter (400 KV/11) and th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Some Methods for Estimating Parameters of General Linear Model in Presence of Heteroscedastic Problem and High Leverage Points
...Show More Authors

Linear regression is one of the most important statistical tools through which it is possible to know the relationship between the response variable and one variable (or more) of the independent variable(s), which is often used in various fields of science. Heteroscedastic is one of the linear regression problems, the effect of which leads to inaccurate conclusions. The problem of heteroscedastic may be accompanied by the presence of extreme outliers in the independent variables (High leverage points) (HLPs), the presence of (HLPs) in the data set result unrealistic estimates and misleading inferences. In this paper, we review some of the robust

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2026
Journal Name
Lecture Notes In Networks And Systems
The Iraqi Judicial System in Light of the Activation of the Role of the Forensic Accountant: Proposed Strategies and Methods
...Show More Authors

Forensic accounting (FA) is an important tool in exposing financial manipulation and corruption within institutions, making the role of FA essential in the Iraqi judicial system (IJS). This role suffers from limited implementation due to the lack of specialized legislation and insufficient awareness of its importance. The role of FA in the IJS can be enhanced by enhancing professional training, amending university curricula to include FA, and developing legislation regulating this field. Furthermore, cooperation between courts and the FA should be strengthened to ensure adequate financial evidence (FE) in judicial cases. For example, the experiences of developed countries, such as the United States and the United Kingdom, demonstrate how FA

... Show More
View Publication
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Ijddt
Synthesis, antioxidant activity and molecular docking study of 1, 2, 4-Triazole and their corresponding fused rings containing 2-Methylphenol
...Show More Authors

Newly 4-amino-1,2,4-triazole-3-thione ring 2 was formed at position six of 2-methylphenol from the reaction of 6-(5-thio1,3,4-oxadiazol-2-yl)-2-methylphenol 1 with hydrazine hydrochloride in the presence of anhydrase sodium acetate. Seven newly fused heterocyclic compounds were synthesized from compound 2. First fused heterocyclic was 6-(6-(3,5-di-tertbutyl-4-hydroxyphenyl)-[1,2,4]triazolo[3,4-b][1,3,4]thiadiazol-3-yl)-2-methylphenol 3 synthesized from reaction compound 2 with 3,5-di-tert-butyl-4-hydroxybenzoic acid in POCl3. Reaction compound 2 with bromophencylbromide afford 6-(6-(4-bromophenyl)-5H-[1,2,4]triazolo[3,4-b][1,3,4]-thiadiazin-3-yl)-2-methylphenol 4. 6-(6-thio-1,7a-dihydro-[1,2,4] triazolo[3,4-b][1,3,4]-thiadiazol-3-yl)-2

... Show More
Preview PDF
Publication Date
Sat Jan 31 2026
Journal Name
International Journal Of Intelligent Engineering And Systems
Low-complexity Deep Learning for Joint Channel-type Identification and SNR Estimation in MIMO-OFDM Using CNN–BRNN with LUT Labels
...Show More Authors

Channel estimation (CE) is essential for wireless links but becomes progressively onerous as Fifth Generation (5G) Multi-Input Multi-Output (MIMO) systems and extensive fading expand the search space and increase latency. This study redefines CE support as the process of learning to deduce channel type and signal-tonoise ratio (SNR) directly from per-tone Orthogonal Frequency-Division Multiplexing (OFDM) observations,with blind channel state information (CSI). We trained a dual deep model that combined Convolutional Neural Networks (CNNs) with Bidirectional Recurrent Neural Networks (BRNNs). We used a lookup table (LUT) label for channel type (class indices instead of per-tap values) and ordinal supervision for SNR (0–20 dB,5-dB steps). T

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Study of Spectroscopy and Thermodynamic Properties for Phoshours dioxide PO2 Molecular and Influence Study of Bond ( P-O ) on Spectroscopy Properties
...Show More Authors

In This research a Spectroscopic complement and Thermodynamic properties for molecule PO2 were studied . That included a calculation of potential energy . From the curve of total energy for molecule at equilibrium distance , for bond (P-O), the degenerated of bond energy was (4.332eV) instate of the vibration modes of ( PO2 ) molecule and frequency that was found active in IR spectra because variable inpolarization and dipole moment for molecule. Also we calculate some thermodynamic parameters of ( PO2 ) such as heat of formation , enthalpy , heat Of capacity , entropy and gibb's free energy Were ( -54.16 kcal/mol , 2366.45 kcal/mol , 10.06 kcal /k/mol , 59.52 k

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Bayesian Computational Methods of the Logistic Regression Model
...Show More Authors
Abstract<p>In this paper, we will discuss the performance of Bayesian computational approaches for estimating the parameters of a Logistic Regression model. Markov Chain Monte Carlo (MCMC) algorithms was the base estimation procedure. We present two algorithms: Random Walk Metropolis (RWM) and Hamiltonian Monte Carlo (HMC). We also applied these approaches to a real data set.</p>
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref